Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting., , , and . Comput. Networks, (2016)Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services., , , and . Internet Measurement Conference, page 365-372. ACM, (2016)Measuring and Applying Invalid SSL Certificates: The Silent Majority., , , , , , and . Internet Measurement Conference, page 527-541. ACM, (2016)Not Your Average App: A Large-scale Privacy Analysis of Android Browsers., , , , , , and . Proc. Priv. Enhancing Technol., 2023 (1): 29-46 (January 2023)Understanding Dark Patterns in Home IoT Devices., , , , , and . CHI, page 179:1-179:27. ACM, (2023)A Broad View of the Ecosystem of Socially Engineered Exploit Documents., , , , and . NDSS, The Internet Society, (2017)Drafting behind Akamai (travelocity-based detouring)., , , and . SIGCOMM, page 435-446. ACM, (2006)Crowdsourcing service-level network event monitoring., , and . SIGCOMM, page 387-398. ACM, (2010)The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover., , , , and . SIGCOMM Posters and Demos, page 63-64. ACM, (2017)On blind mice and the elephant: understanding the network impact of a large distributed system., , , , and . SIGCOMM, page 110-121. ACM, (2011)